Вы находитесь на странице: 1из 8

Quinn Hecker

IST 195

12/9/16

IST 195 Final Study Guide - Textbook

Chapter 1: Computers, Devices, and Web

1. Interacting with today’s technology

a. How do people interact with technology?

i. Includes desktop computers, mobile devices, tablets etc

2. Data and information

a. Input/output

b. Different devices we use to interact with data

3. Online social networks

a. Popular social networks (Twitter, Facebook)

c. What they enable us to do and how they affect communication

on the internet

4. Technology in use

a. How is technology used?

d. What businesses use technology and how do they use it?

Chapter 2: The Internet, Websites, and Media

1. Netiquette
a. Guidelines for online communication

5. The World Wide Web

a. Creator, its purpose, how it works

6. Internet browsers

a. What are internet browsers used for and why do we use them?

7. Internet Protocols

a. Main protocols that govern the internet (ex: SMTP, FTP, VoIP)

e. Know their definitions and uses

8. Connecting to the Internet

a. IP addresses, domains, Internet Service Providers (ISP)

Chapter 3: Evaluating Options for Home and Work

1. Servers

a. Different types of servers (ex: applications, backup, database)

9. Mobile computers and desktops

a. Components of computers (ex: motherboard, hard drive, etc)

f. Difference between desktop, laptop, and mobile computer

10. Cloud Computing

a. What is cloud computing?

g. How do businesses use cloud computing and how do they benefit

from it?
Chapter 4: Productivity, Graphics, Security, etc

1. Document formatting

a. Fonts, spacing, headings, etc

11. Enterprise computing

a. What are the departments managed by it?

12. Graphics and media apps

a. Different subsets (ex: desktop publishing, paint/image editing,

video editing, etc.)

h. What are different tools used in each of these applications and

why would you use them?

13. Security filters

a. Focus on virus and malware

i. Programs and techniques used to prevent it

Chapter 5: Threats, Issues, and Defenses

1. Internet and network attacks

a. What is malware?

j. Common types of malware (ex: virus, worm, trojan horse, etc.)

14. Cybercrime

a. Types of cybercrime perpetrators (ex: cracker, hacker, script

kiddies)
15. Access controls

a. Different strategies and methods for access control (password,

usernames, pins, etc.)

k. What are some of the biometric devices used for access control?

16. Information Privacy

a. Right of individuals and companies to deny or restrict the

collection

l. Why is this important to users?

Chapter 6: Processors, Memory, the Cloud

1. The Internet of Things

a. What is IoT?

m. What kind of network technology makes the IoT work?

17. Cloud Computing

a. What are the four reasons to move to the cloud?

n. What are the different cloud computing services?

18. Data Representation

a. What are the different coding schemes

19. Memory

a. What are the different types of memory?

o. What are the functions of each of these different types?


Chapter 7: Extending Capabilities of Computers

1. Input Devices

a. Ex: mouse, keyboard, trackpad, etc

20. Output Device

a. Printers, speakers

21. What are the different guidelines for input/output devices?

a. Ex. ways to protect your credit card from scanning devices

Chapter 8: Preserving Content Locally and the Cloud

1. Storage vs. Memory

a. Storage: items that are stored remain intact even if the computer

is powered off

p. Memory: holds data or instructions for programs

22. Hard drives

a. Hard Disk Drive (HDD)

q. Solid State Drive (SSD)

23. Enterprise Storage

a. What are the different types of enterprise storage?

i. Ex: RAID

r. What are their functions?


i. RAID: backup technique that provides applications with

reliable data access

Chapter 9: Managing, Coordinating, and Monitoring Resources

1. Operating Systems

a. What is the function of an operating system?

s. What are the four main operating systems?

24. Mobile Operating Systems

a. What are the three main operating systems for mobile devices?

t. What are the differences and similarities of them?

25. What does the term desktop mean in regards to Windows and

Mac?

Chapter 10: Wired and Wireless Net

1. Communications software

a. Programs and apps that help users establish a connection to

another computer, mobile device, or network

u. Manage the transmission of data, instructions, and information

v. Provide an interface for users to communicate with

26. Network Architectures

a. What are the different network architectures and the

advantages/disadvantages?
27. Network Standards/Protocols

a. What are these standards and their definitions

28. Physical Transmission Media

a. What are the different cable types and how fast do they transmit

data?

Chapter 11: Database, System, and Application Development Tools

1. Hierarchy of Data

a. Why do we organize data hierarchically and how does this

benefit an information system?

29. Databases

a. Difference between redundant data and isolated data?

w. Why do we take a database approach?

x. What is the most popular database approach today

30. Big Data

a. What are some of the sources and uses of big data?

y. How does data visualization assist in the use of big data?

31. System Development Life Cycle

a. What is it and why do we use it?

z. What are the different phases of the SDLC?

Chapter 12: Systems, Certifications, and Careers


1. What are some of the different careers you could have in

technology

a. Ex: government organizations, technology service/repair, etc.

32. Technology Certifications

a. What are the different types of certifications and how are they

beneficial?

Вам также может понравиться